Roles Reference
API endpoints for managing roles, grants, and permissions
The Sanity Roles system is a granular way of attaching specific capabilities to specific groups of users. It is designed to function in a structured and flexible way. The goal of the Roles system is to provide a set of strong default permissions groups with an API for creating, managing, and using custom roles built the way your organization works with content.
The Roles system is comprised of five main entities:
- Grants
- Resources
- Permission Resource Schema
- Roles
- Members (users)
A grant is the root item in the roles system. They represent the ability to perform a specific action or give access to a specific resource.
A resource defines an element of a Sanity project or organization on which a user can have special grants.
These permission pairs are defined in the related Permission Resource Schema. In addition, each grant may also have parameters, further limiting the scope of that permission.
A Permission Resource Schema (or simply "Permission") defines a set of possible actions that defines what can be performed on specific resources. These can be accessed via the /projects/${project_id}/permissionResourceSchemas
endpoint. Each provides a template for use in the creation of new roles and custom permissions.
Use cases
- A grant to read and edit (but not publish) documents of
blogPost
on theproduction
dataset - A grant to create project API tokens
[
{
"id": "srp-bvl4pkml",
"title": "Project Tokens",
"description": "Manage authorization tokens for a project",
"name": "sanity.project.tokens",
"permissions": [
{
"name": "read",
"title": "Read",
"description": "Ability to read project tokens",
"params": []
},
{
"name": "create",
"title": "Create",
"description": "Ability to create project tokens",
"params": []
},
{
"name": "delete",
"title": "Delete",
"description": "Ability to delete project tokens",
"params": []
}
]
},
{
"id": "srp-ysohuysj",
"title": "Project CORS",
"description": "Manage CORS settings for a project",
"name": "sanity.project.cors",
"permissions": [
{
"name": "read",
"title": "Read",
"description": "Ability to read project cors",
"params": []
},
{
"name": "create",
"title": "Create",
"description": "Ability to create project cors",
"params": []
},
{
"name": "delete",
"title": "Delete",
"description": "Ability to delete project cors",
"params": []
}
]
},
{
"id": "srp-2ve36erw",
"title": "Sanity Document Filter",
"description": "Defines a permission resource for a filtered collection of Sanity documents",
"name": "sanity.document.filter",
"permissions": [
{
"name": "create",
"title": "Create",
"description": "Create documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
},
{
"name": "read",
"title": "Read",
"description": "Read documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
},
{
"name": "update",
"title": "Update",
"description": "Update documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
},
{
"name": "manage",
"title": "Manage",
"description": "Manage documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
},
{
"name": "history",
"title": "History",
"description": "Read the history of documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
},
{
"name": "editHistory",
"title": "Edit History",
"description": "Edit the history of documents matching the filter",
"params": [
{
"name": "datasetPolicyId",
"type": "string",
"title": "Dataset Policy Id",
"description": "A dataset policy id to scope the permission"
}
]
}
]
},
]
Roles define a set of grants which project members can have assigned to them. A project member can have many roles and grants, even within the same organization.
By default, there are specifically defined roles available for each plan type. Custom roles are available for Enterprise customers.
- Administrator: Read and write access to all datasets, with full access to all project settings.
- API Tokens
- Editor Token (read+write)
- Viewer Token (read-only)
- Administrator
- Viewer: Can view all documents in all datasets within the project
- Administrator
- Editor
- Viewer
- Developer
- Contributor: Read and write access to draft content within all datasets, with no access to project settings.
A member is a person making use of a Sanity resource. A member always references the system via a role and is defined by an associated email.
A token is a unique string that can be used to authorize requests towards your content lake. A token can be given a role that defines its access to the system. Tokens should generally be considered secret.
Paid feature
Custom roles are included in Enterprise plans.
To create a custom role, you need to create a new role, create the grants for the role, and assign the role to individual users.
A custom role is an object containing a title
, name
, and description
properties. In this example, a custom role with a name of custom-role
, a title of My Custom Role
, and a description of Custom role
is created by sending that data to a given projects /roles
API endpoint.
curl \
-X POST \
-H "Authorization: Bearer ${apiBearerToken}"
-H "Content-Type: application/json"
-d '{"title": "My Custom Role", "name": "custom-role", "description": "Custom role"}'
https://api.sanity.io/v2021-06-07/projects/${projectId}/roles
This is now a custom role, but it currently has no granted permissions. To add permissions, you connect each permission to the role via the /grants
API endpoint.
To see the available permission resources for the current project, you can send a GET
request to the /permissionResources
API endpoint for the current project.
curl \
-X GET \
-H "Authorization: Bearer ${apiBearerToken}"
https://api.sanity.io/v2021-06-07/projects/${projectId}/permissionResources
Once you select the resources from this list you wish to add to the role, you can send a POST
request to the /grants
endpoint for the project for each addition.
curl \
-X POST
-H "Authorization: Bearer ${apiBearerToken}"
-H "Content-Type: application/json"
-d '{"roleName": "custom-role", "permissionName": "${permissionName}", "permissionResourceId": "${permissionResourceName}"}'
https://api.sanity.io/v2021-06-07/projects/${projectId}/grants
Paid feature
Custom roles are included in Enterprise plans.
The above examples create a new role using pre-made permission resources. However, when you need to create granular permissions for specific roles, you can create a custom permission resource.
For Sanity to understand your resource, you need to have it correspond to a specific permission resource schema. You can see all the schema by sending a GET request to the /projects/${projectId}/permissionResourceSchemas
endpoint. These function much like a configurable template for your custom permission.
To create a custom resource around a specific set of documents, you can use the sanity.document.filter
schema. This schema provides a config
option for adding a GROQ filter to specify a specific set of documents. The permissions
array gives you the name of all the permissions that Sanity will understand with this template (e.g. "update," "read," etc.).
{
"id": "srp-2ve36erw",
"title": "Sanity Document Filter",
"description": "Defines a permission resource for a filtered collection of Sanity documents",
"name": "sanity.document.filter",
"config": [
{
"name": "filter",
"type": "string",
"title": "Filter",
"description": "GROQ filter limiting the document collection"
}
],
"permissions": [
{
"name": "update",
"title": "Update",
"description": "Update documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "read",
"title": "Read",
"description": "Read documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "manage",
"title": "Manage",
"description": "Manage documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "history",
"title": "History",
"description": "Read the history of documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "create",
"title": "Create",
"description": "Create documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
}
]
To create the resource, you need to pass an object containing its details to the /permissionResources
endpoint.
curl \
-X POST
-H "Authorization: Bearer ${apiBearerToken}"
-H "Content-Type: application/json"
-d '{"permissionResourceType": "sanity.document.filter", "title": "Awesome Documents!", "description": "Our awesome documents", "config": {"filter": "_type == \"awesome\""}}'
https://api.sanity.io/v2021-06-07/projects/${projectId}/permissionResources
When the permission resource is created, an id
will be returned. This ID can be used to create a grant based on this resource. Just like in the above examples, only one grant will be created at a time.
# Create read grant for custom-role
curl \
-X POST
-H "Authorization: Bearer ${apiBearerToken}"
-H "Content-Type: application/json"
-d '{"roleName": "custom-role", "permissionName": "read", "permissionResourceId": "${idReturned}"}'
https://api.sanity.io/v2021-06-07/projects/${projectId}/grants
# Create Update grant for custom-role
curl \
-X POST
-H "Authorization: Bearer ${apiBearerToken}"
-H "Content-Type: application/json"
-d '{"roleName": "custom-role", "permissionName": "update", "permissionResourceId": "${idReturned}"}'
https://api.sanity.io/v2021-06-07/projects/${projectId}/grants
At this point, any user with the custom role will have this specific set of permissions around documents of a _type == "awesome"
.
The following are the granular permission grants for the default roles available for various plans. You can view your default permission resources by sending a GET
request to a project's /roles endpoint.
[
{
"name": "administrator",
"title": "Administrator",
"description": "Administrate projects",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": true,
"appliesToRobots": false,
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "publish",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
],
"sanity.project": [
{
"grants": [
{
"name": "createSession",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "deployStudio",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
"sanity.project.cors": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.datasets": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
"sanity.project.graphql": [
{
"grants": [
{
"name": "manage",
"params": {}
}
],
"config": {}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "delete",
"params": {}
},
{
"name": "invite",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
"sanity.project.roles": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
"sanity.project.tokens": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.usage": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.webhooks": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "contributor",
"title": "Contributor",
"description": "Read and write to select datasets within the project",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": true,
"appliesToRobots": true,
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "create",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.roles": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "create-session",
"title": "Create Session",
"description": "Create third-party sessions, manage third-party user profiles",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": false,
"appliesToRobots": true,
"grants": {
"sanity.document.filter": [
{
"grants": [
{
"name": "create",
"params": {
"datasetPolicyName": "default"
}
},
{
"name": "history",
"params": {
"datasetPolicyName": "default"
}
},
{
"name": "manage",
"params": {
"datasetPolicyName": "default"
}
},
{
"name": "read",
"params": {
"datasetPolicyName": "default"
}
},
{
"name": "update",
"params": {
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "!(_id in [\"_.groups.create-session\", \"_.groups.administrator\", \"_.groups.write\", \"_.groups.read\", \"_.groups.public\"] || _id in path(\"_.groups.sanity.**\")) && _id in path(\"**\")"
}
}
],
"sanity.project": [
{
"grants": [
{
"name": "createSession",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "update",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "deploy-studio",
"title": "Deploy Studio",
"description": "A role that is only allowed to deploy the studio",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": false,
"appliesToRobots": true,
"grants": {
"sanity.project": [
{
"grants": [
{
"name": "deployStudio",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.graphql": [
{
"grants": [
{
"name": "manage",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "developer",
"title": "Developer",
"description": "Develop the projects",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": true,
"appliesToRobots": true,
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "publish",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
],
"sanity.project": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.cors": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.datasets": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
"sanity.project.graphql": [
{
"grants": [
{
"name": "manage",
"params": {}
}
],
"config": {}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "invite",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.roles": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.tokens": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.usage": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.webhooks": [
{
"grants": [
{
"name": "create",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "read",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "editor",
"title": "Editor",
"description": "Editor can make changes to all datasets within the project",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": true,
"appliesToRobots": true,
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "publish",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
],
"sanity.project": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.datasets": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.roles": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.usage": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
]
}
},
{
"name": "viewer",
"title": "Viewer",
"description": "Viewer can view all documents in all datasets within the project",
"isCustom": false,
"projectId": "xxxxxx",
"appliesToUsers": true,
"appliesToRobots": true,
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "read",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
],
"sanity.project": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.datasets": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.members": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.roles": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
],
"sanity.project.usage": [
{
"grants": [
{
"name": "read",
"params": {}
}
],
"config": {}
}
]
}
}
]
A list of endpoints for dealing with users, grants, and roles for individual projects.
GET /projects/${projectId}/grants
Request
curl --request GET 'https://api.sanity.io/v2021-10-04/projects/${projectId}/grants' \ --header 'Authorization: Bearer ${Bearer token}'
Output
{
"sanity.project": [
{
"grants": [
{
"name": "createSession",
"params": {}
},
{
"name": "delete",
"params": {}
},
{
"name": "deployStudio",
"params": {}
},
{
"name": "read",
"params": {}
},
{
"name": "update",
"params": {}
}
],
"config": {}
}
],
// ... other grants
}
GET /projects/${projectId}/roles
Input
curl --request GET 'https://api.sanity.io/v2021-10-04/projects/${projectId}/roles' \ --header 'Authorization: Bearer ${Bearer Token}'
Response
[
{
"name": "administrator",
"title": "Administrator",
"description": "Administrate projects",
"isCustom": false,
"projectId": "3do82whm",
"grants": {
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "publish",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
]
// ... additional grants
}
}
// ... additional roles
]
GET /projects/${projectId}/permissionResourceSchemas
Request
curl --request GET 'https://api.sanity.io/v2021-10-04/projects/${projectId}/permissionResourceSchemas' \ --header 'Authorization: Bearer ${Bearer Token}'
Output
[
{
"id": "srp-2ve36erw",
"title": "Sanity Document Filter",
"description": "Defines a permission resource for a filtered collection of Sanity documents",
"name": "sanity.document.filter",
"config": [
{
"name": "filter",
"type": "string",
"title": "Filter",
"description": "GROQ filter limiting the document collection"
}
],
"permissions": [
{
"name": "update",
"title": "Update",
"description": "Update documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "read",
"title": "Read",
"description": "Read documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "manage",
"title": "Manage",
"description": "Manage documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "history",
"title": "History",
"description": "Read the history of documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "editHistory",
"title": "Edit History",
"description": "Edit the history of documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
},
{
"name": "create",
"title": "Create",
"description": "Create documents matching the filter",
"params": [
{
"name": "datasetPolicyName",
"type": "string",
"title": "Dataset Policy Name",
"description": "A dataset policy name to scope the permission",
"defaultValue": "default"
}
]
}
]
}
]
GET /projects/${projectId}/acl
Request
curl --location --request GET 'https://api.sanity.io/v2021-10-04/projects/${projectId}/acl' \ --header 'Authorization: Bearer ${Bearer Token}'
Output
[
{
"projectUserId": "p.....",
"roles": [
{
"name": "administrator",
"title": "Administrator"
}
],
"isRobot": false
}
]
GET /projects/${projectId}/acl/${userId}
Request
curl -H "Authorization: Bearer ${token}" 'https://api.sanity.io/v2021-10-04/projects/${projectId}/acl/${userId}'
Output
{
"role": "administrator",
"projectUserId": "${userId}",
"isRobot": false
}
PUT /projects/${projectId}/acl/${userId}
Request
curl --location --request PUT 'https://api.sanity.io/v2021-10-04/projects/${projectId}/acl/${userId}' \ --header 'Content-Type: application/json' \ --data-raw '{ "roleName": "${roleName}" }'
DELETE /projects/${projectId}/acl/${userId}
Request
curl --request DELETE 'https://api.sanity.io/v2021-10-04/projects/${projectId}/acl/${userId}' \ --header 'Authorization: Bearer ${Bearer Token}' \ --header 'Content-Type: application/json' \ --data-raw '{ "roleName": "${roleToRemove}" }'
API endpoints allowing inspection and modifications of roles and users in an organization.
GET /organizations/${organizationID}/acl
Request
curl -X GET /organizations/${organizationId}/acl
Response
[
{
"sanityUserId": "g...",
"roles": [
{
"name": "administrator",
"title": "Administrator"
}
]
},
{
"sanityUserId": "g...",
"roles": [
{
"name": "administrator",
"title": "Administrator"
}
]
}
]
GET /organizations/${organizationId}/acl/${sanityUserId}
PUT /organizations/${organizationId}/acl/${sanityUserId}
Request
curl -X PUT /organizations/${organizationId}/acl/${sanityUserId} \ --header "Content-Type: application/json" \ --data '{roleName:"editor"}'
Response
HTTP 201 Created
DELETE /organizations/${organizationId}/acl/${sanityUserId}
Request
curl -X DELETE /organizations/${organizationId}/acl/${sanityUserId} \ --header "Content-Type: application/json" \ --data '{roleName:"editor"}'
Response
HTTP 200 OK
GET /organizations/${organizationId}/grants
Request
curl -X GET /organizations/${organizationId}/grants \
Creates or updates role mappings for a specific SSO provider and project within an organization. For use with SAML SSO implementations.
Gotcha
This API is not available for use with robot tokens.
Request
POST /api/organizations/{organizationId}/providers/{providerId}/projects/{projectId}/role-mappings
organizationIdstring
The ID of the organization
providerIdstring
The ID of the SSO provider
projectIdstring
The ID of the project
Requires the update
permission for the sanity.organization
resource.
fallbackRoleNamestring
(Optional) The fallback role name. Can be null.
REQUIREDroleMappingsarray
An array of role mapping objects. Defaults to an empty array.
Note: If id
is provided, it will update an existing mapping. If not, it will create a new mapping.
Deletes all project role mappings for a specific SSO provider and project within an organization. For use with SAML SSO implementations.
Gotcha
This API is not available for use with robot tokens.
Request
DELETE /organizations/{organizationId}/providers/{providerId}/projects/{projectId}/role-mappings
organizationIdstring
The ID of the organization
providerIdstring
The ID of the SSO provider
projectIdstring
The ID of the project
Requires the update
permission for the sanity.organization
resource.
GET /projects/${projectId}/datasets/${datasetName}/acl
Request
curl -X GET https://api.sanity.io/v2021-06-07/projects/${projectId}/datasets/${datasetName}/acl
Response
[
{
"filter": "_id in path(\"**\")",
"grants": ["read", "update", "create", "history"]
}
]
GET /projects/${projectId}/datasets/${datasetName}/grants
Request
curl -X GET https://api.sanity.io/v2021-06-07/projects/${projectId}/datasets/${datasetName}/grants
Output
{
"sanity.document.filter.mode": [
{
"grants": [
{
"name": "mode",
"params": {
"mode": "publish",
"history": true,
"datasetPolicyName": "default"
}
}
],
"config": {
"filter": "_id in path(\"**\")"
}
}
]
}